Showing posts with label networking. Show all posts
Showing posts with label networking. Show all posts

Sunday, June 6, 2010

The Best Ways to Secure Your Wireless Network

You can easily prevent your neighbors or passers by from leeching off of your wireless network, and also prevent other more serious unauthorized access by these methods.
  • Disable broadcasting of the SSID (network name) This will prevent most normal people from being able to see the network in the first place, unless they are using a wireless stumbler utility program on their computer. Even if someone can see the signal of an unnamed network, they will won't be able to connect unless they can guess the name of the network correctly.
  • Enable Mac Address Filtering. This will only allow devices to connect to the network which match the mac addresses you've supplied. Every device with a wireless card has a unique mac address. This will prevent just about anyone from accessing your network, because they will have to guess a correct mac address that matches what you've added to the list. Mac addresses are made of up 12 hexadecimal characters, which means there are 281 trillion possible mac addresses according to Wikipedia.
  • Use a strong password for the network. Don't use English words or other words from any language, use at least 8 characters, and at least one capital letter. Stronger passwords would ideally be 11 or more characters long.

Other things to secure a wireless network here:
Wireless Security - WiFi Wireless Home Network Security Tips - About.com

What Type of Wireless Network Security should I use?
(all info below compiled from DD-WRT's Wireless Security page)
  • WEP is the worst kind to use.
  • WPA2 seems to be the most common more secure option comared to the outdated WEP.

To keep things simple, the best options, in decreasing order of preference, may be:

  1. WPA2 + AES
  2. WPA + AES (only if all devices support it).
  3. WPA + TKIP+AES (only if all devices can support it).
  4. WPA + TKIP
  5. WEP (will only keep out people with none or poor experience in computers)
  6. Disabled (no security)

The most common two options will be WPA2 + AES and WPA + TKIP, because they match the mandatory requirements in the standards (WPA2 requires AES, WPA requires TKIP).

You can use WPA + AES for higher security than TKIP, but only if your devices support it (it is optional). For this reason it is not very common. You also do not get the improved roaming features of WPA2.

WEP was supposed to provide Confidentiality, but has found to be vulnerable and should no longer be used.

* Has been found to be vulnerable.
* Is often the default; this should be changed.
* Most devices that support WEP can be firmware/software upgraded to WPA.
* Do not use unless some devices can not be upgraded to support WPA.

WEP has been outdated for years and has better replacements. The 40-bit encryption is just not strong enough to keep data secure and can be broken rather easily. Newer encryption methods use stronger encryption and have yet to be broken while WEP can be broken in a minute according to this resource.

Use WPA where possible.

Friday, June 4, 2010

Most Reliable Routers

Here is a list of the most reliable wireless routers, compiled from user comments collected here: Ask Engadget: What's the most reliable wireless router? -- Engadget

** One major caveat: the included firmware (software that runs the router) on Linksys routers has reliability problems. Under normal use, these routers have to be rebooted about 1-2 times a week, sometimes more. Under heavy use, like streaming Netflix videos, downloading large files, or getting torrents, they drop connections and have to be rebooted multiple times per day.

Overall, many comments pointed to Netgear routers being some of the worst routers available on the market.

The most reliable routers by user comments:

Apple Airport Extreme
mentions: 40

Linksys WRT54G with DD-WRT firmware
mentions: 38

Linksys WRT54GL with DD-WRT or Tomato firmware
mentions: 15+

D-Link DIR-655
mentions: 7

Cisco 871W
mentions: 4

D-Link DGL-4500
mentions: 3

Apple Airport Express
mentions: 3

Buffalo WHR-HP-G54 with DD-WRT firmware
mentions: 2

Linksys WRT600N
mentions: 2

Linksys WRT610N
mentions: 2

Linksys WRT54GS with DD-WRT or Tomato firmware
mentions: 2

Linksys WRT310N with DD-WRT firmware
mentions: 2

Linksys WRT350N with DD-WRT firmware
mentions: 2

Linksys WRT300N with DD-WRT firmware
mentions: 2

Cisco ASA5505
mentions: 2

Cisco Aironet 11300
mentions: 2

Other models with 1 mention:

Asus 500 Premium v2
Belkin F5D7231
Buffalo WZR2-G300N (with DD-WRT)
Buffalo WHR-G125 (with DD-WRT)
Buffalo WHR-G545
Cisco 2600
Cisco 881W
D-Link DIR-615
D-Link DIR-855
Engenius ESR-9710
Linksys WRT150N
Linksys WRT160N
Motorola WR850G (with Tomato)
Netgear WNR834B (with DD-WRT)
Soekris 5501-70

Sunday, September 6, 2009

Installing DD-WRT

After reading over many forum posts about installing DD-WRT, here's what seems to be the consensus
  • Disable Anti-virus and Firewall software before running TFTP
  • Set the TFTP utility for 99 tries
  • NEWD-2 firmware versions are not compatible with the Linksys WRT54G2 and will brick it.
  • A newer version of DD-WRT should be flashed after DD-WRT is setup
  • As of 7/25/09, someone recommended version 12548 on the forums [Post]
  • The mac address reported by DD-WRT needs to match the mac address of the router
  • Tx power of 35-60 mW seems to stabilize the WRT54G2 model and 70 mW is too much for them according to redhawk0. [Post]
  • If you need help on the forums, include the router model/version and the version number of DD-WRT that is running on the router


Resources: